Allow per-VM protected file list

Hopefully this can be pushed as an update for Qubes 3.2 as well?
This commit is contained in:
Rudd-O 2018-10-24 07:32:19 +00:00 committed by GitHub
parent 914c96c1f1
commit 1ecb680b44
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,7 +1,7 @@
#!/bin/bash #!/bin/bash
# Location of files which contains list of protected files # Location of files which contains list of protected files
PROTECTED_FILE_LIST='/etc/qubes/protected-files.d' PROTECTED_FILE_LIST='/etc/qubes/protected-files.d /rw/qubes/protected-files.d'
qsvc() { qsvc() {
# Returns whether a service is enabled. # Returns whether a service is enabled.
@ -100,7 +100,7 @@ reload_random_seed() {
} }
is_protected_file() { is_protected_file() {
grep -Fxrq --exclude='*.rpmsave' --exclude='*~' --exclude='*.rpmnew' --exclude='*.rpmold' -- "${1}" "$PROTECTED_FILE_LIST" 2>/dev/null grep -Fxrq --exclude='*.rpmsave' --exclude='*~' --exclude='*.rpmnew' --exclude='*.rpmold' -- "${1}" $PROTECTED_FILE_LIST 2>/dev/null
} }
umount_retry() { umount_retry() {